Datasets:

ArXiv:
License:
nbaiot / README.md
codymlewis's picture
Create README.md
a8d31ad
metadata
dataset_info:
  features:
    - name: features
      sequence: float32
      length: 115
    - name: attack
      dtype:
        class_label:
          names:
            '0': benign_traffic
            '1': combo
            '2': junk
            '3': mirai-ack
            '4': mirai-scan
            '5': mirai-syn
            '6': mirai-udp
            '7': mirai-udpplain
            '8': scan
            '9': tcp
            '10': udp
    - name: device
      dtype:
        class_label:
          names:
            '0': Danmini_Doorbell
            '1': Ecobee_Thermostat
            '2': Ennio_Doorbell
            '3': Philips_B120N10_Baby_Monitor
            '4': Provision_PT_737E_Security_Camera
            '5': Provision_PT_838_Security_Camera
            '6': Samsung_SNH_1011_N_Webcam
            '7': SimpleHome_XCS7_1002_WHT_Security_Camera
            '8': SimpleHome_XCS7_1003_WHT_Security_Camera
  splits:
    - name: train
      num_bytes: 2857231888
      num_examples: 6002588
    - name: test
      num_bytes: 504568568
      num_examples: 1060018
  download_size: 1772922927
  dataset_size: 3361800456
license: cc-by-4.0
pretty_name: nbaiot

Dataset Card for N-BAIoT

From https://archive.ics.uci.edu/dataset/442/detection+of+iot+botnet+attacks+n+baiot: This dataset addresses the lack of public botnet datasets, especially for the IoT. It suggests real traffic data, gathered from 9 commercial IoT devices authentically infected by Mirai and BASHLITE.

Dataset Details

Dataset Description

From https://archive.ics.uci.edu/dataset/442/detection+of+iot+botnet+attacks+n+baiot: (a) Attribute being predicted: -- Originally we aimed at distinguishing between benign and Malicious traffic data by means of anomaly detection techniques. -- However, as the malicious data can be divided into 10 attacks carried by 2 botnets, the dataset can also be used for multi-class classification: 10 classes of attacks, plus 1 class of 'benign'.

(b) The study's results: -- For each of the 9 IoT devices we trained and optimized a deep autoencoder on 2/3 of its benign data (i.e., the training set of each device). This was done to capture normal network traffic patterns. -- The test data of each device comprised of the remaining 1/3 of benign data plus all the malicious data. On each test set we applied the respective trained (deep) autoencoder as an anomaly detector. The detection of anomalies (i.e., the cyberattacks launched from each of the above IoT devices) concluded with 100% TPR.

Dataset Sources

Citation

BibTeX:

@misc{misc_detection_of_iot_botnet_attacks_n_baiot_442, author = {Meidan,Yair, Bohadana,Michael, Mathov,Yael, Mirsky,Yisroel, Breitenbacher,Dominik, ,Asaf, and Shabtai,Asaf}, title = {{N-BaIoT Dataset to Detect IoT Botnet Attacks}}, year = {2018}, howpublished = {UCI Machine Learning Repository}, note = {{DOI}: https://doi.org/10.24432/C5RC8J} }

APA:

Meidan, Yair, Bohadana, Michael, Mathov, Yael, Mirsky, Yisroel, Breitenbacher, Dominik, ,Asaf, and Shabtai, Asaf. (2018). N-BaIoT Dataset to Detect IoT Botnet Attacks. UCI Machine Learning Repository. https://doi.org/10.24432/C5RC8J.

Glossary [optional]

  • IoT: Internet of Things
  • Botnet: A collection of devices that are maliciously controlled via malware